ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • 2013 Cost of Data Breach Study: UK

    Sponsored by: ComputerWeekly.com

    The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.

  • CW Special report on Symantec

    Sponsored by: ComputerWeekly.com

    This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.

  • Information security trends

    Sponsored by: ComputerWeekly.com

    This report from CompTIA, based on original research, assesses the current trends in information security.

  • Mobile: The Technology Game-Changer in 2013

    Sponsored by: SearchSecurity.com

    TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.

  • How SSL-Encrypted Web Connections are Intercepted

    Sponsored by: SearchSecurity.com

    In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.

  • BYOPC Strategy: Policies and Problem Solving

    Sponsored by: SearchSecurity.com

    Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.

  • IT Security Purchasing Intentions 2013

    Sponsored by: ComputerWeekly.com

    This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.

  • De-risking IT Lifecycle Management

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.

  • Enterprise Mobile Device Security Best Practices

    Sponsored by: SearchSecurity.com

    This E-Guide from SearchConsumerization.com explores the top four best practices for keeping your corporate information safe in case a mobile device is lost or stolen.

  • IT Handbook : Smartphones & Tablets in the Enterprise

    Sponsored by: SearchSecurity.com

    This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization.

  • Website Security Threat Report, Part Two

    Sponsored by: Symantec Corporation

    This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.

  • Explaining How Trusted SSL Certificates and Forged SSL Certificates Work

    Sponsored by: Symantec Corporation

    Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.

  • Improving Enterprise Email Security: Systems and Tips

    Sponsored by: Agari

    This expert e-guide details systems that can help improve your email security and tips on how to keep it secure.

  • Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance

    Sponsored by: Ipswitch File Transfer

    This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.

  • A CIO's Five-Point Plan for Managing Endpoint Security

    Sponsored by: Dell KACE

    Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.

  • Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities

    Sponsored by: GeoTrust, Inc.

    This e-guide from SearchSecurity.com explores the issues threatening SSL vulnerabilities and offers advice on how to defend against said risks. View now to learn more!

  • Explaining How Trusted SSL Certificates and Forged SSL Certificates Work

    Sponsored by: GeoTrust, Inc.

    This e-guide from SearchSecurity.com takes an in-depth look at what Certificate Authorities and digital certificates do for secure web browsing and explores what trusted SSL certificates and forged SSL certificates mean to your business.

  • How iOS Encryption and Data Protection Work

    Sponsored by: Symantec Corporation

    This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.

  • Hot Tips for Securing Your Wireless Network

    Sponsored by: Sophos

    Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.

  • Mobile Health Handbook: Device Security

    Sponsored by: SearchHealthIT.com

    Finding the balance between convenience and security is the key for successful mobile device management. Review expert techniques and strategies for achieving this objective in this handbook on mobile device security for the health care organization.

  • Recommended Best Security Practices for Unified Communications

    Sponsored by: Polycom, Inc.

    Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.

  • Making Mobility Matter in Healthcare Data Security

    Sponsored by: DellEMC and Intel®

    This white paper highlights the need for health care organizations to have solid encryption and risk assessment procedures and policies in place.

  • Healthcare Information at Risk: Encryption is not a Panacea

    Sponsored by: Intel

    This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.

  • IT Security: Built-In Protection with Intel vPro Technology

    Sponsored by: Intel

    New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.

  • Enabling High Performance for Apple iPads in the Enterprise

    Sponsored by: Aruba Networks

    Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.